Users Guide

Table Of Contents
4 Contents
Single IP Management . . . . . . . . . . . . . . . 65
Primary Failover with Transparent Transition
. . . 65
Nonstop Forwarding on the Stack
. . . . . . . . . 65
Hot Add/Delete and Firmware Synchronization
. . 65
Security Features
. . . . . . . . . . . . . . . . . . . . 67
Configurable Access and Authentication Profiles
. 67
Password-Protected Management Access
. . . . 67
Strong Password Enforcement
. . . . . . . . . . . 67
TACACS+ Client
. . . . . . . . . . . . . . . . . . . 67
RADIUS Support
. . . . . . . . . . . . . . . . . . 68
SSH/SSL
. . . . . . . . . . . . . . . . . . . . . . . 68
Inbound Telnet Control
. . . . . . . . . . . . . . . 68
Denial of Service
. . . . . . . . . . . . . . . . . . 68
Port Protection
. . . . . . . . . . . . . . . . . . . 69
Captive Portal
. . . . . . . . . . . . . . . . . . . . 70
802.1X Authentication (IEEE 802.1X)
. . . . . . . . 70
MAC-Based 802.1X Authentication
. . . . . . . . . 71
802.1X Monitor Mode
. . . . . . . . . . . . . . . . 71
Port Security
. . . . . . . . . . . . . . . . . . . . 72
Access Control Lists (ACLs)
. . . . . . . . . . . . 72
Time-Based ACLs
. . . . . . . . . . . . . . . . . . 72
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . 73
DHCP Snooping
. . . . . . . . . . . . . . . . . . . 73
Dynamic ARP Inspection
. . . . . . . . . . . . . . 73
Protected Ports (Private VLAN Edge)
. . . . . . . . 73
Green Technology Features
. . . . . . . . . . . . . . . 74
Energy Detect Mode
. . . . . . . . . . . . . . . . 74
Energy Efficient Ethernet
. . . . . . . . . . . . . . 74
Power Utilization Reporting
. . . . . . . . . . . . . 75
Power over Ethernet (PoE) Features
. . . . . . . . . . . 75
PD Detection
. . . . . . . . . . . . . . . . . . . . 75